Cloud Malware and Malware Detection Survey
Abstract
Malware affects computing systems like cloud systems through its malicious actions towards confidentiality, availability, and integrity of system resources and services. Because of the deployment of Cloud Computing environment is increasingly common, and we are implicitly reliant on them for many services as it offers cost-saving service for Cloud user. So, it is important to take care of Cloud Security.
In this paper, we investigate a survey on malware types that may exploit Cloud Computing systems; in the next sections, different aspects of malware detection techniques and types are discussed and how these malware detection systems fit into the cloud computing system architecture. Finally, a comparison between malware detection sensors is provided through many points like modeling techniques, main components, scalability, open source availability, and a risk analysis for those detection systems.
Keywords
Full Text:
PDFReferences
A. K. Marnerides, M. R. Watson, N. Shirazi, A. Mauthe, and D. Hutchison," Malware Analysis in Cloud Computing: Network and System Characteristics", 2013 IEEE Globecom Workshops (GC Wkshps), IEEE, pp. 482 – 487, 2013.
C. Adrián Martínez, G. Isaza Echeverri and A. G. Castillo Sanz, "Malware Detection based on Cloud Computing integrating Intrusion Ontology representation", 2010 IEEE Latin-American Conference on Communications, IEEE, pp. 1 – 6, 2010.
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel and M. Rajarajan, "A survey of intrusion detection techniques in Cloud", Journal of Network and Computer Applications, Elsevier Science, Vol. 36, pp. 42–57, 2013.
E. Biermann, E. Cloete and L.M. Venter, " A comparison of Intrusion Detection systems", Computers & Security, Elsevier Science, Vol. 20, No. 8, pp. 676-683, 2001.
E. Niari Saad*, K. El Mahdi* and M. Zbakh, "Cloud Computing Architectures Based IDS", Complex Systems (ICCS), 2012 International Conference on, IEEE, pp.1-6, 2012.
G. Rajesh Kumar, N. Mangathayaru and G. Narasimha, "Intrusion Detection Using Text Processing Techniques - A Recent Survey", ICEMIS '15 The Proceedings of International Conference on Engineering & MIS 2015, No. 55, 2015.
H. Bait Baraka, H. Tianfie, "Intrusion Detection System for Cloud Environment", SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, ACM, pp. 399, 2014.
J. Aycock, "Computer Viruses and Malware", Springer, Vol. 22, 2006.
M. Abdlhamed, K. Kifayat, Q. Shi and W. Hurst, " A System for Intrusion Prediction in Cloud Computing", ICC '16 Proceedings of the International Conference on Internet of things and Cloud Computing, ACM, No. 35, 2016.
M. Ahmad Khan, "A survey of security issues for cloud computing", Journal of Network and Computer Applications, Elsevier Science, Vol. 71, pp. 11–29, 2016.
M. Guimaraes, M. Murray," Overview of Intrusion Detection and Intrusion Prevention ", InfoSecCD '08Proceedings of the 5th annual conference on Information security curriculum development, ACM, pp. 44-46, 2008.
M. R. Watson, N. Shirazi, A. K. Marnerides, A. Mauthe and D. Hutchison," Malware Detection in Cloud Computing Infrastructures", IEEE Transactions on Dependable and Secure Computing, pp. 1-14, 2015.
P. Garcı´a-Teodoro, J. Dı´az-Verdejo, G. Macia´-Fernandez and E. Vazquez, " Anomaly-based network intrusion detection: Techniques, systems and challenges ", Computers & Security, Elsevier Science, Vol. 28, pp. 18 – 28, 2009.
P. Szor, "The Art of Computer Virus Research and Defense", Addison-Wesley for Symantec Press, New Jersey, 2005.
S. A. Shaikh, H. Chivers, P. Nobles, J. A. Clark and H. Chen, "Characterising intrusion detection sensors, part 2 ", Network Security, Elsevier Science, Vol. 2008, pp. 8–11, 2008.
S. A. Shaikh, H. Chivers, P. Nobles, J. A. Clark and H. Chen, "Characterizing intrusion detection sensors ", Elsevier Science, Network Security, Vol. 2008, pp. 8-11, 2008.
S. Alam, I. Sogukpinar, I. Traore and Y. Coady, " In-Cloud Malware Analysis and Detection: State of the Art", SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, ACM, pp. 473, 2014.
S. N. Dhage, B. B. Meshram, R. Rawat, S. Padawe, M. Paingaokar and A. Misra, "Intrusion Detection System in Cloud Computing Environment", ICWET '11 Proceedings of the International Conference & Workshop on Emerging Trends in Technology, ACM, pp. 235-239, 2011.
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time", Computer Networks The International Journal of Computer and Telecommunications Networking, Vol. 31, pp. 2435-2463, 1999.
Z. Bazrafshan, H. Hashemi, S. Mehdi Hazrati Fard and A. Hamzeh, "A Survey on Heuristic Malware Detection Techniques", Information and Knowledge Technology (IKT), 2013 5th Conference on, IEEE, pp. 113 – 120, 2013.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.